2009 International Conference on Advances in Computational Tools for Engineering Applications 2009
DOI: 10.1109/actea.2009.5227927
|View full text |Cite
|
Sign up to set email alerts
|

Risk management and security in service-based architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 5 publications
0
1
0
Order By: Relevance
“…An elaborated approach that can be used to identify, analyse, evaluate, handle and/or monitor risks [56].…”
Section: Rm-methodsmentioning
confidence: 99%
“…An elaborated approach that can be used to identify, analyse, evaluate, handle and/or monitor risks [56].…”
Section: Rm-methodsmentioning
confidence: 99%
“…In our previous work [10], we showed that, in a service environment, managing security and handling threats requires advanced methodologies for risk management. In order to accomplish the risk identification in step 7B, we relied on a threat modeling approach, particularly the Coras approach [11] due to its flexibility to be used in service environments.…”
Section: Phase 2: Risk Managementmentioning
confidence: 99%